Cost-effective watermark based detector for replay attacks on cyber-physical systems
暂无分享,去创建一个
Wei Xing Zheng | Peng Cheng | Chongrong Fang | Yifei Qi | W. Zheng | Yifei Qi | Chongrong Fang | Peng Cheng
[1] Terry L King. A Guide to Chi-Squared Testing , 1997 .
[2] Ralph Langner. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[3] Panganamala Ramana Kumar,et al. Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[4] Ling Shi,et al. Optimal Periodic Sensor Schedule for Steady-State Estimation Under Average Transmission Energy Constraint , 2013, IEEE Transactions on Automatic Control.
[5] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[6] S. Sastry,et al. Optimal control with unreliable communication: the TCP case , 2005, Proceedings of the 2005, American Control Conference, 2005..
[7] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[8] Ling Shi,et al. Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems , 2017, IEEE Trans. Control. Netw. Syst..
[9] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[10] L. Scharf,et al. Statistical Signal Processing: Detection, Estimation, and Time Series Analysis , 1991 .
[11] Lingkun Fu,et al. DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[12] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[13] Panganamala Ramana Kumar,et al. Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[14] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[15] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[16] Albert Forment Navarro,et al. Security analysis of a wireless quadruple tank control system , 2011 .
[17] Jing Sun,et al. Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .
[18] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[19] Phillipp Meister,et al. Statistical Signal Processing Detection Estimation And Time Series Analysis , 2016 .